Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-5387

Опубликовано: 18 июл. 2016
Источник: redhat
CVSS3: 5
CVSS2: 5
EPSS Высокий

Описание

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

It was discovered that httpd used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 6httpd22Affected
Red Hat JBoss Enterprise Application Platform 7httpdNot affected
Red Hat JBoss Enterprise Web Server 1httpdWill not fix
JBoss Core Services on RHEL 6jbcs-httpd24-httpdFixedRHSA-2016:185112.09.2016
JBoss Core Services on RHEL 7jbcs-httpd24-httpdFixedRHSA-2016:185112.09.2016
Red Hat Enterprise Linux 5httpdFixedRHSA-2016:142118.07.2016
Red Hat Enterprise Linux 6httpdFixedRHSA-2016:142118.07.2016
Red Hat Enterprise Linux 7httpdFixedRHSA-2016:142218.07.2016
Red Hat JBoss Enterprise Web Server 2 for RHEL 6httpdFixedRHSA-2016:164922.08.2016
Red Hat JBoss Enterprise Web Server 2 for RHEL 6jbcs-httpd24FixedRHSA-2016:164922.08.2016

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1353755HTTPD: sets environmental variable based on user supplied Proxy request header

EPSS

Процентиль: 99%
0.71301
Высокий

5 Medium

CVSS3

5 Medium

CVSS2

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 9 лет назад

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 8.1
nvd
около 9 лет назад

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue. NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.

CVSS3: 8.1
debian
около 9 лет назад

The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 ...

suse-cvrf
около 9 лет назад

Security update for apache2

suse-cvrf
около 9 лет назад

Security update for apache2

EPSS

Процентиль: 99%
0.71301
Высокий

5 Medium

CVSS3

5 Medium

CVSS2